Results 1 to 10 of about 172,970 (269)
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba +3 more
doaj +4 more sources
تحسين خوارزمية MD5 بالاعتماد على عدة طرق
المستخلص خوارزميات Hash هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية . هذا البحث يعمل على تعزيز خوارزميةMD5 ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5 هو استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان +1 more
doaj +3 more sources
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +2 more sources
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya +2 more
doaj +2 more sources
Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss +3 more
doaj +2 more sources
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до ...
Гугнин, Владимир Николаевич +1 more
core +4 more sources
Implementasi Kriptografi Untuk Keamanan File Text Dengan Menggunakan Metode MD5
Technological developments, especially in data security systems in maintaining data information security, have developed rapidly. In maintaining the security of information data, there are branches of science in its development such as cryptography ...
Ahmad Zaki Fadilla Rangkuti +1 more
openalex +2 more sources
Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey +4 more
doaj +2 more sources
Key Change Strategies for TCP-MD5
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openalex +4 more sources
Implementation of Nihilist Cipher Algorithm in Securing Text Data With Md5 Verification [PDF]
The development of information technology that is increasingly racing today makes it easy for anyone to exchange data or information. On the other hand, there are problems with data security which can be disrupted by irresponsible parties such as ...
Edy Victor Haryannto +4 more
openalex +2 more sources

